2011
DOI: 10.1016/j.entcs.2011.01.016
|View full text |Cite
|
Sign up to set email alerts
|

Verification of Quantum Protocols with a Probabilistic Model-Checker

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Several papers verify the security of the BB84 quantum key distribution (QKD) protocol. [28,44] show security against a very simple, specific intercept-resend attack (that measures all qubits in a random basis), [34,35] verify one step of the Shor-Preskill proof [41] for QKD. It is not clear whether these approaches can scale to the full proof of QKD.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Several papers verify the security of the BB84 quantum key distribution (QKD) protocol. [28,44] show security against a very simple, specific intercept-resend attack (that measures all qubits in a random basis), [34,35] verify one step of the Shor-Preskill proof [41] for QKD. It is not clear whether these approaches can scale to the full proof of QKD.…”
Section: Related Workmentioning
confidence: 99%
“…That is, we invoke Claim 7 with V c := V c,mc , V d := V d,m d , V e := V e,me (as defined on page 57), ρ cd :=ρ cd,mcm d ,ρ de :=ρ de,m d me (defined in (41), (43)),ρ d :=ρ d,mcm d me (from Claim 6). The assumptions of Claim 7 where shown in (42), (44), and Claim 6. Then by Claim 7, there exists a separableρ cd,…”
Section: Proof Of Claimmentioning
confidence: 99%